1. Aranha, D.F., Fouque, P.-A., Qian, C., Tibouchi, M., Zapalowicz, J.-C.: Binary elligator squared. In: Selected Areas in Cryptography, SAC 2014, LNCS, pp. 20–37, Springer.
2. Avanzi R., Cohen H., Doche C., Frey G., Lange T., Nguyen K., Vercauteren F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005).
3. Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: Elliptic-curve points indistinguishable from uniform random strings. In: Sadeghi A.R., Gligor V.D., Yung M. (eds.) ACM Conference on Computer and Communications Security. pp. 967–980. ACM (2013).
4. Bernstein, D.J., Lange, T., Martindale, C., Panny, L.: Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies. Ishai, Y. et al. (ed.) Advances in cryptology–EUROCRYPT 2019. In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, LNCS, vol. 11477, pp. 409–441 (2019).
5. Boneh, D., Franklin, K.: Identity-based encryption from the weil pairing. In: CRYPTO 2001, LNCS, vol. 2139, pp. 213–229 Springer (2001).